1 |
Hybus, [Online]. Available: http://hybus.net/ko/sub/product/view.asp?p_idx=68&s_cate=1217
|
2 |
Harimoorthy, K., Thangavelu, M., "Multi-disease prediction model using improved SVM-radial bias technique in healthcare monitoring system," J Ambient Intell Human Comput, vol. 12, pp. 3715-3723, 2021.
DOI
|
3 |
Milne, G.R., Pettinico, G., Hajjat, F.M. and Markos, E., "Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing," J Consum Aff, vol. 51, no. 1, pp. 133-161. 2017.
DOI
|
4 |
AAMI, "Testing and reporting performance results of cardiac rhythm and ST segment measurement algorithms," ANSIAAMI EC38, Tech. Rep., 1998.
|
5 |
J. Y. Cho, D. Ko and B. G. Lee, "Strategic Approach to Privacy Calculus of Wearable Device User Regarding Information Disclosure and Continuance Intention," KSII Transactions on Internet and Information Systems, vol. 12, no. 7, pp. 3356-3374, Jul. 2018.
DOI
|
6 |
G.-S. Ham and S.-C. Joo, "Development of Authentication Service Model Based ContextAwareness for Accessing Patient's Medical Information," Journal of Internet Computing and Services, vol. 22, no. 1, pp. 99-107, Feb. 2021.
DOI
|
7 |
Y. Kim and Y. J. Choi, "Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment," Journal of Information and Security, vol. 19, no. 3, pp. 29-36, 2019.
|
8 |
Lee, C. H., & Yoon, H. J., "Medical big data: promise and challenges," Kidney research and clinical practice, vol. 36, no. 1, pp. 3-11. Mar. 2017.
DOI
|
9 |
M. A. Khan, M. T. Quasim, N. S. Alghamdi and M. Y. Khan, "A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data," IEEE Access, vol. 8, pp. 52018-52027, 2020.
DOI
|
10 |
Kim Jeom Goo, "Implementation of Role-based Multi-authentication System for Secure Smart Home," the journal of Korean institute of next generation computing, vol. 17, no. 4, pp. 59-68, 2021.
DOI
|
11 |
Ren, X., Zhai, Y., Song, X., Wang, Z., Dou, D., & Li, Y., "The application of mobile telehealth system to facilitate patient information presentation and case discussion," Telemedicine and eHealth, vol. 26, no. 6, pp. 725-733, 2020.
DOI
|
12 |
Park M, Oh H, Lee K, "Security Risk Measurement for Information Leakage in IoT-Based Smart Homes from a Conditional Awareness Perspective," Sensors, vol. 19, no. 9, May. 2019.
|
13 |
X. Liu, Y. Zhu, Y. Ge, D. Wu and B. Zou, "A Secure Medical Information Management System for Wireless Body Area Networks," KSII Transactions on Internet and Information Systems, vol. 10, no. 1, pp. 221-237, Jan. 2016.
DOI
|
14 |
P. Pace, G. Aloi, R. Gravina, G. Caliciuri, G. Fortino and A. Liotta, "An Edge-Based Architecture to Support Efficient Applications for Healthcare Industry 4.0," IEEE Transactions on Industrial Informatics, vol. 15, no. 1, pp. 481-489, Jan. 2019.
DOI
|
15 |
Min Chen, Wei Li, Yixue Hao, Yongfeng Qian and Iztok Humar, "Edge cognitive computing based smart healthcare system," Future Generation Computer Systems, vol. 86, pp. 403-411, Sep. 2018.
DOI
|
16 |
M. A. Rahman, M. S. Hossain, N. A. Alrajeh and N. Guizani, "B5G and Explainable Deep Learning Assisted Healthcare Vertical at the Edge: COVID-I9 Perspective," IEEE Network, vol. 34, no. 4, pp. 98-105, Jul. 2020.
DOI
|
17 |
J. Kim and K. Chung, "Prediction Model of User Physical Activity using Data Characteristicsbased Long Short-term Memory Recurrent Neural Networks," KSII Transactions on Internet and Information Systems, vol. 13, no. 4, pp. 2060-2077, Apr. 2019.
DOI
|
18 |
Yi Yu, Jingsha He, Nafei Zhu, Fangbo Cai, Muhammad Salman Pathan, "A new method for identity authentication using mobile terminals," Procedia Computer Science, vol. 131, pp. 771-778, 2018. .
DOI
|
19 |
J.-Y. Hong and H.-H. Kim, "A Study on Awareness Levels of Personal Information Protection in Health Care Workers," Journal of the Korea Entertainment Industry Association, vol. 13, no. 8, pp. 647-659, Dec. 2019.
DOI
|
20 |
El-hajj, Mohammed, Ahmad Fadlallah, Maroun Chamoun, and Ahmed Serhrouchni, "A Survey of Internet of Things (IoT)- Authentication Schemes," Sensors, vol. 19, no. 5, p. 1141, 2019.
|
21 |
IBM, "Cost of a Data Breach Report 2021," 2021. [Online]. Available: https://www.ibm.com/security/data-breach
|
22 |
Su-Chong Joo, "Automatic Authentication Method based on Dynamic Context for Transparent Access for Medical Information," South Korea Patent 10-2026018, Sep. 2019.
|
23 |
Kai Hwang, Min Chen, Big-data analytics for cloud, IoT and cognitive computing, Hoboken, New Jersey: Wiley, Apr. 2018.
|
24 |
Darshan K R and Anandakumar K R, "A comprehensive review on usage of Internet of Things (IoT) in healthcare system," in Proc. of 2015 International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT), pp. 132-136, 2015.
|
25 |
Ahmed Ismail, Samir Abdlerazek and I. M. El-henawy, "Big Data Analytics in Heart Diseases Prediction," Journal of Theoretical and Applied Information Technology, vol. 98, no. 11, pp. 1970-1980, Jun. 2020.
|
26 |
Nishita Mehta, Anil Pandit, "Concurrence of big data analytics and healthcare: A systematic review," International Journal of Medical Informatics, vol. 114, pp. 57-65, Jun. 2018.
DOI
|
27 |
Lorkowski J., Grzegorowska O., Pokorski M., "Artificial Intelligence in the Healthcare System: An Overview," in Best Practice in Health Care, Pokorski M. eds., vol. 1335, Ed. Poland, Springer, 2021, pp. 1-10
|
28 |
F. J. P. Montalbo, "A Computer-Aided Diagnosis of Brain Tumors Using a Fine-Tuned YOLO-based Model with Transfer Learning," KSII Transactions on Internet and Information Systems, vol. 14, no. 12, pp. 4816-4834, Dec. 2020.
|
29 |
A. Rasheed, P. H. J. Chong, I. W. Ho, X. J. Li and W. Liu, "An Overview of Mobile Edge Computing: Architecture, Technology and Direction," KSII Transactions on Internet and Information Systems, vol. 13, no. 10, pp. 4849-4864, Oct. 2019.
DOI
|
30 |
"Blood Pressure and Blood Sugar Data," National Health Insurance Sharing Service(NHISS) Korea. [Online]. Available: https://nhiss.nhis.or.kr/bd/ab/bdabf003cv.do
|
31 |
Habib, Carol, et al., "Health risk assessment and decision-making for patient monitoring and decision-support using wireless body sensor networks," Information fusion, vol. 47, pp. 10-22, May. 2019.
DOI
|
32 |
Moody GB, Mark RG, "The impact of the MIT-BIH Arrhythmia Database," IEEE Eng in Med and Biol, vol. 20, no. 3, pp. 45-50, Jun. 2001.
DOI
|
33 |
Singh, S.P., Nayyar, A., Kumar, R. et al. "Fog computing: from architecture to edge computing and big data processing," J Supercomput, vol. 75, pp. 2070-2105, Apr. 2019.
DOI
|
34 |
Wellysis, [Online]. Available: https://www.wellysis.com/
|
35 |
S.-C. Bae, Y.-S. Lee, and S.-W. Choi, "Vision-based Authentication and Registration of Facial Identity in Hospital Information System," Journal of the Korea Society of Computer and Information, vol. 24, no. 12, pp. 59-65, 2019.
DOI
|
36 |
Edward Min, "The Application of Deep Convolutional Networks for the Classification of ECG Signal," GitHub, 2019. [Online]. Available: https://github.com/eddymina/ECG_Classification_Pytorch
|
37 |
D. Eom, H. Lee, and H. Zoo, "Medical Information Privacy Concerns in the Use of the EHR System: A Grounded Theory Approach," Journal of Digital Convergence, vol. 16, no. 1, pp. 217-229, Jan. 2018.
DOI
|
38 |
Jayabalan, Manoj, and Thomas O'Daniel, "A study on authentication factors in electronic health records," Journal of Applied Technology and Innovation, vol. 3, no. 1, pp. 7-14, 2019.
|